Re: [9fans] shell functions

2014-10-01 Thread arisawa
thanks for all. our conclusion is: worthless to fix. Kenji Arisawa

Re: [9fans] shell functions

2014-09-29 Thread erik quanstrom
> today, we have a number of malicious request to our web server. i don't see any malicious requests that could possibly bother the standard release. plan 9 is just too obscure to bother with. - erik

Re: [9fans] shell functions

2014-09-29 Thread Russ Cox
On Fri, Sep 26, 2014 at 12:32 PM, Kurt H Maier wrote: > Quoting Russ Cox : > > The right fix is to eliminate all possible interaction between (1) and >> (2). >> The first public fix focused instead on making (1) more robust, and guess >> what, it wasn't good enough and now there is a *second* CV

Re: [9fans] shell functions

2014-09-29 Thread Charles Forsyth
On 29 September 2014 14:03, arisawa wrote: > today, we have a number of malicious request to our web server. > assume a web server accept a request with a query > query='fn#foo=fn%20foo%20{echo%20yes};%20echo%20no%0a’ > but why should a web server put arbitrary data from a remote user un

Re: [9fans] shell functions

2014-09-29 Thread arisawa
Hi, Richard, Problems comes from careless CGI handling. keep the following result in mind term% 'fn#foo'='fn foo {echo yes}; echo no ' term% rc no term% today, we have a number of malicious request to our web server. assume a web server accept a request with a query query='fn#fo

Re: [9fans] shell functions

2014-09-29 Thread Richard Miller
> when rc is invoked, rc reconstructs shell variable and shell functions using > files in /env/. > in case of shell functions, rc evaluates whole data in the file. > this feature makes problem if the content is > fn foo {…}; maliciouscommand How would a malicious agent put something into /e

Re: [9fans] shell functions

2014-09-28 Thread arisawa
Hello, when rc is invoked, rc reconstructs shell variable and shell functions using files in /env/. in case of shell functions, rc evaluates whole data in the file. this feature makes problem if the content is fn foo {…}; maliciouscommand I think this problem must be fixed. Kenji Arisawa

Re: [9fans] shell functions

2014-09-27 Thread Christian Neukirchen
Russ Cox writes: > Thanks to name space hygiene on td's part, the rc function space and the > CGI variable space do not overlap, so rc already has no possible > interaction with CGI, which is as it should be. I don't think it is super > important to try to make rc defend against malicious environ

Re: [9fans] shell functions

2014-09-26 Thread Kurt H Maier
Quoting Skip Tavakkolian : you misrepresent. rsc addressed the non-web-centric issue: I don't think it is super important to try to make rc defend against malicious environments, any more than it is to make it somehow defend against malicious $paths. If those are security-relevant, you've a

Re: [9fans] shell functions

2014-09-26 Thread Bakul Shah
With manipulating a path you still need access to a writable filesystem to subvert a child shell. That step is not necessary if you can pass functions in the environment. > On Sep 26, 2014, at 8:54 AM, Russ Cox wrote: > > +9fans, since a few people have asked > >> On Thu, Sep 25, 2014 at 6:1

Re: [9fans] shell functions

2014-09-26 Thread Skip Tavakkolian
you misrepresent. rsc addressed the non-web-centric issue: > I don't think it is super important to try to make rc defend against malicious environments, any more than > it is to make it somehow defend against malicious $paths. If those are security-relevant, you've already lost. On Fri, Sep 26,

Re: [9fans] shell functions

2014-09-26 Thread Kurt H Maier
Quoting Russ Cox : The right fix is to eliminate all possible interaction between (1) and (2). The first public fix focused instead on making (1) more robust, and guess what, it wasn't good enough and now there is a *second* CVE about this problem, and a *second* attempt at making (1) more robus

Re: [9fans] shell functions

2014-09-26 Thread Russ Cox
+9fans, since a few people have asked On Thu, Sep 25, 2014 at 6:15 PM, Scott Schwartz wrote: > Reading about the latest bash bug, I tried this with rc. > Is it a bug? Feature? Other? > > bash$ env 'fn#foo'='{true} > date > ' rc > Thu Sep 25 15:07:16 PDT 2014 > % whatis foo > fn foo {true} > I